Skip to main content
  • Conference proceedings
  • © 2006

Information Security Applications

6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3786)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISA: International Conference on Information Security Applications

Conference proceedings info: WISA 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (29 papers)

  1. Front Matter

  2. Security Analysis and Attacks

    1. Cryptanalysis of Some Group-Oriented Proxy Signature Schemes

      • Je Hong Park, Bo Gyeong Kang, Sangwoo Park
      Pages 10-24
    2. Application of LFSRs in Time/Memory Trade-Off Cryptanalysis

      • Sourav Mukhopadhyay, Palash Sarkar
      Pages 25-37
  3. System Security

    1. Key Factors Influencing Worm Infection in Enterprise Networks

      • Urupoj Kanlayasiri, Surasak Sanguanpong
      Pages 54-67
  4. Network Security

    1. A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network

      • Kihun Hong, Souhwan Jung, S. Felix Wu
      Pages 96-107
    2. Elastic Security QoS Provisioning for Telematics Applications

      • Minsoo Lee, Sehyun Park, Ohyoung Song
      Pages 126-137
  5. DRM/Software Security

    1. An Improved Algorithm to Watermark Numeric Relational Data

      • Fei Guo, Jianmin Wang, Zhihao Zhang, Xiaojun Ye, Deyi Li
      Pages 138-149
    2. Video Fingerprinting System Using Wavelet and Error Correcting Code

      • Hyunho Kang, Brian Kurkoski, Youngran Park, Hyejoo Lee, Sanguk Shin, Kazuhiko Yamaguchi et al.
      Pages 150-164
    3. Kimchi: A Binary Rewriting Defense Against Format String Attacks

      • Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim
      Pages 179-193
    4. Software Protection Through Dynamic Code Mutation

      • Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya Debray, Bjorn De Sutter, Koen De Bosschere
      Pages 194-206
  6. Efficient HW Implementation

    1. Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(p m)

      • Mun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim
      Pages 207-217
    2. Developing and Implementing IHPM on IXP 425 Network Processor Platforms

      • Bo-Chao Cheng, Ching-Fu Huang, Wei-Chi Chang, Cheng-Shong Wu
      Pages 218-231
    3. Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices

      • Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama
      Pages 232-242

Other Volumes

  1. Information Security Applications

Editors and Affiliations

  • Department of Computer Science, Yonsei University, Shinchon-Dong, Seoul, Korea

    Joo-Seok Song

  • School of Computer Science and Engineering, Seoul National University,  

    Taekyoung Kwon

  • Computer Science Department, Google Inc. and Columbia University, New York, USA

    Moti Yung

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access